How To Hack Device Using Mac Address

Okay, so I have two people around my home that seem to be accessing my wireless network and using it without my permission. I know that I can just add a password to the wireless or add a Mac address filter in my router. But I want to teach those guys a lesson.

I have the information regarding their Mac address and IP address that they are connected to. So, is there any way that I can hack into their computers to, you know, access their files or something else?

If that’s not legal then how do I send a message to their computer through LAN saying “Stay away from my Wireless”?

Find Device From Mac Address

Jul 25, 2012  Go to the printer, usually devices will have the MAC ADDRESS printed on the back, so for example, lets say my printer has this MAC ADDRESS: 01-00-5e-7f-ff-fa So what I can do is run the arp command. To run the arp utility, open your command terminal. I am using windows 7 for this tutorial, so I will use windows DOS terminal. Find your target's phone's Media Access Control (MAC) address. A MAC address is a unique identifier assigned to your phone or other device that essentially serves as its online identity. Find and write down your target's MAC address. It takes the form of six pairs of letters or numbers, separated by colons (01:23:45:67:89:ab). To restore back your original MAC address, click the Restore Original button on Technitium MAC Address Changer program. Download Technitium MAC Address Changer. To manually change your MAC address in Windows 7 without using a third party software, go to Control Panel System Device Manager.

I am on Windows 7.

  1. ok so i just figured it out wow .. i have been driving myself crazy for months thinking i was loosing it i even went to forums for viruses looking for help my file sharing kept getting turned on and my files were being accessed but everyone told me i was crazy well an abrupt turn around allowed me to see the other person on my network trying to access server on itunes .. how do i turn that right back on that person .. let me think i was going crazy .. this whole time

  2. Enter
    NET USE IPADDRESS
    TO SHUTDOWN
    -s -t 00 -m IPADDRESS

  3. Hi I have a clown who continuously downloads videos and pornography on the work network, How can I access his computer and files to put a block on all his videos and delete some of the torrent downloads this bastard uses and give him a serious wake up.

  4. You could just add a mac address filter , that would be the best way. Open up your router's settings page (usually 192.168.0.1 or 192.168.1.1) and log in using your routers username and password. There will be a page showing all currently connected users on the router , from which you can find the mac code (it is usually there , if not , you can find it in other ways but I've never done it) and block them using that. This will mean IP spoofing would be useless and they would have to get a new NIC in order for them to connect to your wireless router.

    Hope this helps!

    Jim

  5. hi,pls i want to no how hack get into computer on the same network.eg my net work place

  6. Okay, so I have two people around my home that seem to be accessing my wireless network and using it without my permission. I know that I can just add a password to the wireless or add a Mac address filter in my router. But I want to teach those guys a lesson.

    I have the information regarding their Mac address and IP address that they are connected to. So, is there any way that I can hack into their computers to, you know, access their files or something else?

    If that’s not legal then how do I send a message to their computer through LAN saying “Stay away from my Wireless”?

    I am on Windows 7.

    • Most routers allow you to set rules to forward users to another site. I will let you work the rest out on your own >:)

  7. This is how you can easily send a message to their computer and shut it down.
    All you do is go into command prompt ( open up start and go into cmd) then once that has loaded type in,

    shutdown -i

    Then hit enter and a box should pop up. Click 'browse' and then select they're computers ip addresses, or if you already now them just click 'add' and type them in. After this you can choose either 'shutdown' or 'restart' in a drop-down box, type in your message and press ok.

    Thats it

  8. Okay, so I have two people around my home that seem to be accessing my wireless network and using it without my permission. I know that I can just add a password to the wireless or add a Mac address filter in my router. But I want to teach those guys a lesson.
    I have the information regarding their Mac address and IP address that they are connected to. So, is there any way that I can hack into their computers to, you know, access their files or something else?
    If that’s not legal then how do I send a message to their computer through LAN saying “Stay away from my Wireless”?
    I am on Windows 7.

  9. If they haven't hacked into your files then why would you care that they're using your internet access? You said yourself that you knew you could stop them from using it by throwing up a password protection so why not do that. Obviously you just want to hack into THEIR stuff. In that case, u suck!

  10. Its just simple.Change the passeord of your wireless network.

  11. You can send them message via cmd. just go to start menu and type cmd.exe in search bar then type net view,it'll show you users of your wifi, then type shutdown -i in cmd, it'll pop-up a new window and click on add , then type their computer name and type your message in comment, then press ok. then your message will be shown on their computers screen..but you can do it when they are connected to your wi-fi. if you have any question . send me mail on parthtalati39@gmail.com,or call me on +17788901056.ok ..

    • Parth r u hacker , i wana hack pc by cmd , i tried many ways written in blog but everytime host not found n ol things, comeup, or any tool that will help. tanks in advance

  12. or u mount there harddisk on ur comupter and format it :), google it for more info im not gonna wirte how to do it here

    • 1 tip so u know what to google when u type 192.168.1.1 u can see there mac address

  13. Wow, I didnt expect to get this much help. thanks a lot for all your time.
    I am having real fun with the shutdown command XD

  14. open cmd as a admin write net view then you can se who´s on your network then you take´s the name and write ping 'the name' then your will get the ip then write shutdown -i the there will come a menu where push the add then write in the ip and you can shutdown the victems computer and write a massege to them

  15. Once they connect open cmd and type 'shutdown -i', chose the seconds,message ..etc.. And it will shut down their computers.
    Safe. Harmless. Legal.

  16. download bluebeam vu for mac Hi umm i have a question regarding network sharing and/or hacking.
    Im trying to open files on my laptop, but through my i pad, so my question is, is there a way i can do that if we are connected to the same wireless?

  17. Try to launch an attack using ( Armatige ) by Metasploit, ( Languard Scanner is a great tool for vulnerability scan - amazing tools ), Backtrack 5 is another operating system with tons of penetration test tools especially for Wireless Connections and of course using a Laptop computer. Also remember to used as a virtual machine using VMware so that you don't get trace for your own security just in case. la but not least Wireshark is a network protocol analyzer for Unix and Windows and its use just google it so you know know the how to use it.
    These are just a few of many great tools if you really want to Hack the Planet. ; )

  18. how can i hack into the computer if i don't the user's password?

  19. If you are remotely connected, you can type in any cmd command and then their host name and hit enter..

  20. If you are remotely connected, you can type in any cmd command and then their host name and hit enter..

  21. HOW CAN I HACK SOME ONES WIRELESS USING Cmd Prompt?

  22. Use mgs now in Windows 7

  23. kind of seems he wants to hack into theirs. not many good reasons for that. password the router, anything else might be a crime but is definitely unethical.

  24. In the UK, it is illegal to access another computer without permission, alter files etc, distribute malicious code etc with the same intent. Also it migh be regarded as illegal to simply access an unsecured wireless network without the owners permission. The real question to my mind is why you would run a wireless network without a password and/or MAC filtering anyway? I would worry less about who you KNOW is accessing your network, and more about those you may not have noticed.

  25. Get a copy of backtrack live cd, and look up tutorials about SNIFFING. Weeks of fun, I'll be writing a tutorial for this if you care to hold on a few weeks.

  26. There are a few things you can do.. See if they have shared folders --> check Workgroup computers.
    If you can access their files, you can do all sorts of harm like change files, delete them, rename them, or even use their printer.

    You might also be able to remote desktop their computer and control it, and a number of other things.

    However, I wouldn't recommend you delete their files, they are your neighbours, and you may need there help later on.

    Just simply log into your router, setup mac filtering and block their mac address. Sure there are ways around it, but I wouldn't think they would know how too, if they did, they would know not to access your network.

    • I just remember, I wrote a post about what you can do http://www.jackcola.org/blog/111-how-to-check-if-someone-is-stealing-your-internet

  27. Your success will largely depend on the configuration of their computers and your router.

    Option 1) Windows file sharing. Hold down the windows key, press r. Type in [ip address of their computer] and hit enter. The slashes must face this direction. If they have Windows file sharing enabled, you will now connect to their computer and see whatever files they're sharing (if any; note that they may have password-protected these files).

    Option 2) NET SEND. You have Windows 7, from which NET SEND functionality has been removed by Microsoft. If your target PCs are running XP or earlier, you can download a NET SEND replacement utility and use it to send the targets a popup box with any message you choose. (utility: http://www.winsentmessenger.com/sent/). Enter a command prompt (win-r, cmd, enter.) and type 'net send ipaddress message' (no quotes). People have had mixed success with net sending to ip's, the consensus is generally that LAN ip's work for net sending. However, it may not work.

    Option 3) Upsidedownternet. There's a well-circulated tutorial that requires a dedicated linux box for a router, so it's not practical, but worth adding. http://www.ex-parrot.com/~pete/upside-down-ternet.html

    Option 4) Firesheep. Install this program and wait until the target becomes active. Start monitoring in Firesheep and wait for them to access a supported site. Then you're logged in as them and can do whatever trolling you wish. http://codebutler.com/firesheep (requires firefox on your computer).

    • Yeah, rename the network to something like 'Connect here to share your files with me'.

      • Yeah, I could do that. or, I could simply add a password.
        But how do I send a message to the computer via LAN? There used to be a command like 'Netsend' but I read somewhere that this feature was removed in Windows 7. Any solutions to get around this problem?

        • 'msg' is the command corresponding to 'net send' in Windows XP.

how to hack a phone

Find Mac Address Of Device

To begin with a day till the night, we all are busy with our smartphones. We all know that the smartphones have become an important part of our life. Most importantly, we use smartphones to connect with people. But everything in this universe has it’s pro and cons as well. So, there are several advantages and several problems with smartphones which may affect our life. For example, as a parent or head of a company, we can have a fear of getting our child in wrong hands or getting cheated by our employees. In order to prevent this situation from occurring, one of the best ways is to track them and their phone. In this article, I will try to tell you almost everything about how to hack a phone.

How to Hack a Phone (Android)?

Hack Phone Using Mac Address

A while ago, I watched a documentary on two white hat hackers, hacking about 12 students mobiles. However, their attack method was outdated compared to present one. They used two laptops, and Maltego CE Transformers to create a MiTM (Man-in-The-Middle) attack. They actually proved their point by entering some of the students mobiles, accessing their Facebook accounts, reading their emails, this was a test just to show what they could do.
The main part of their attack was the Wi-fi pineapple which costs $100. There are tons of software which are avilable for free on the internet like the raspberry pi v3 and kali Linux. In my next post, I will try to cover some basic concepts of it.

MAC Spoofing

Hack Iphone With Mac Address

A Media Access Control address is a 12-character unique identifier assigned to the network adapter of your WiFi device. A MAC address can be used to uniquely identify the smartphone of your friend whom you want to hack the Whatsapp account. If you want to access the WhatsApp account of your friend, you need to find the MAC address of their account. Follow the below steps in order to hack your friend’s account.

First, uninstall WhatsApp from your device. Secondly, acquire the smartphone of the target(victim) that you wish to hack. The victim’s mobile phone will be essential at two variant steps throughout the hacking process. Be cautious while using the victim’s phone. Don’t take much time and try to place it back before the victim starts to locate the device. Thirdly, locate the MAC address from the target’s phone. A MAC address is a 12-character identifier.
A MAC address varies from one device to other. So, try to find the platform of the victim’s smartphone. Also, find the MAC address of your own smartphone and save it in a secure manner.

Next, spoof your MAC address similar to the victim’s MAC address. by doing this, the MAC address allow your mobile device to disguise as victim’s device. Also, there is an advantage of letting you persuade WhatsApp that you are logging into your own account. But, truly you are trying to log in into the victim’s WhatsApp account. Next, install various spoofing applications depending on the victim’s smartphone. For android device, go for terminal emulator and busy box. For IOS device, go for MacDaddy X or Wi-fi Spoof.

How to Hack a Phone using Terminal Emulator

While using terminal, type “ip link show” and it will show a list of interfaces. after that, identify the one which has your MAC address.
In the terminal emulator, enter “ip link set eth0 address XX:XX:XX:XX:XX:XX” and “ip link set eth0 broadcast XX:XX:XX:XX:XX:XX”, where eth0 is the interface you identified and XX:XX:XX:XX:XX:XX is your target’s MAC address. Next, reinstall and configure WhatsApp in your smartphone. After doing this, you can access the victim’s account. So, start this by adding the phone number of the victim’s account while setting up the account. This allows you to receive and send messages from the victim’s account.

During the configuration process, the confirmation code will be sent to victim’s phone number. Access the victim’s phone for the last time to acquire that verification code. Enter that code in your phone and you are good to go. Next, change your MAC address as quick as possible after successfully accessing the victim’s phone.

How to Hack a Phone using Spyware?

According to the current market trend, there are many companies that are promoting spyware applications and people are willing to pay for it. But before doing such thing, choose only genuine companies which are trustworthy. According to me, MySpy is one of the most trustworthy spying application available on play store. You will have to download and install the mySpy app onto the victim’s phone on which you want to access and monitor the WhatsApp messages. The spy apps that you use are very much essential and intended for the employees, parents, government officials in order to access or monitor the activities of subordinates, children and other . Here are some steps on “how to hack a phone using MySpy” application.

First of all, make sure that the victim gives permission to access and monitor their mobile. After that, install MySpy on your phone as well as on victim’s phone. Next, follow the instructions carefully so as to install the app and make sure that you configure all your settings properly. Now it’s time to start our hacking process. Now, you can receive and send messages on the victim’s account. Finally, you’ve have hacked the victim’s account. If you’ve any other great ideas, comment down below and don’t forget to follow us on Instagram.


How To Block Devices Using Mac Address


Hack Phone With Mac Address